Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Down with QWERTY! (Score 1) 201

It came from the keyboard designer's name: August Dvorak.

It's really too bad that Qwerty is lot more catchier than Dvorak. Mr. Qwerty probably suffered a lot of bullying as a child but thanks to his catchy name his design won out in the end and thus his legacy will remain with us for millennia (until we get cybernetic man-machine interfaces).

Comment Re:WTF... (Score 1) 339

iANAL, but the GPL says:

b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.

I don't see where this "passing on the offer" part came from.

If I demand the source code and the vendor tells me "we're passing on the offer to you, but too bad so sad it's expired already" then that's fraud, plain and simple.

It's no different than if I brought something on eBay and the seller tells me "the item is no longer being manufactured and thus I can't fulfill your order, thanks for the free money sucker".

Comment Re:WTF... (Score 2) 339

[1] This actually provides a fairly simple loophole if you're willing to wait three years: take some GPL code, modify it, and give it to a third party. They then sit on it for three years and then sell it as a binary-only product. They pass on your (now expired) offer, and no one has the right to demand the source code from you.

They can't. If they can't fulfill the requirements of the GPL (offer to provide source for 3 years), then they can't legally distribute the code.

Comment Re:Seems reasonable (Score 1) 307

Oops, totally forgot about that. You're right, the hash of the IP of every poster must be recorded, but only until the comment is vetted by the moderators. Suppose the mods go through all the comments once a day, then the hash of the not-banned users will only be stored for 24 hours at max.

It's not a great scheme, admittedly, but at least it's better than status quo.

Comment Re:Seems reasonable (Score 1) 307

Getting back to the great-GP: " "We're sorry your honour, but we do not require contributors to register under their real name, and we do not record IP addresses of all visitors. We only record a cryptographic hash of the IP address of people who have been banned.".

It doesn't solve the problem, but at least it minimizes it. Only people who have been banned will lose their anonymity. Assume, for example, that only 1% of visitors are banned, then the problem is now two orders of magnitude smaller.

Comment Re:Relevance (Score 1) 196

This is hugely relevant when I transmute myself into a tentacle monster.

Fake eyes on autotomic* tentacles will give me the tactical advantage I need to evade the police and finally get laid.



*Brownie points for anyone who knows this word off the top of their head.

Slashdot Top Deals

It is clear that the individual who persecutes a man, his brother, because he is not of the same opinion, is a monster. - Voltaire

Working...